Page 1
The security guidance described in this document applies to any boards based on STM32U585xx microcontrollers. UM2852 - Rev 1 - June 2021 www.st.com For further information contact your local STMicroelectronics sales office.
UM2852 General information General information ® STM32CubeU5 TFM application runs on STM32U585xx 32-bit microcontrollers based on the Arm ‑M processor. ® Cortex Note: ® is a registered trademark of Arm Limited (or its subsidiaries) in the US and/or elsewhere. UM2852 - Rev 1 page 2/27...
Page 3
UM2852 General information The following table presents the definition of acronyms that are relevant for a better understanding of this document. Table 1. List of acronyms Acronym Description AEAD Authenticated encryption with associated data Command‑line interface Entity attestation token Graphic user interface Secure hide protection Hardware unique key Hardware...
The TOE is distributed as an MCU with a source code package. The integrator receives the MCU directly from ST via a secure courier. To ensure that MCU is not manipulated during TOE delivery, the integrator must verify that the user Flash is virgin (reading 0xFF everywhere with STM32CubeProgrammer) or must do an RDP regression (Level 1 ->...
USB cable. This connection with the PC allows the user: • Flashing the board • Interacting with the board via a UART console • Debugging when the protections are disabled The ST-LINK firmware programmed on the development board must be the V3J8M3 version. UM2852 - Rev 1 page 6/27...
UM2852 Secure installation 3.2.2 Software setup This section lists the minimum requirements for the developer to set up the SDK on ® a Windows 10 host, run the sample scenario and customize applications delivered in STM32Cube_FW_U585_Security_certification_V1.0.0 software package. STM32Cube_FW_U585_Security_certification_V1.0.0 software package ®...
Page 8
UM2852 Secure installation The certified configuration is the following: • RDP level 2 with password capability • Two firmware images • Two slots per firmware image • Image upgrade in overwrite mode • Hardware‑accelerated cryptography enabled • RSA 2048 asymmetric crypto scheme •...
UM2852 Operational user guidance Operational user guidance User roles The following user roles are distinguished for this TOE: • Integrator The integrator is the one to receive the TOE, perform the preparative procedures as described in Section 3 Preparative procedures, and integrate the TOE into a full IoT solution. The user operational guidance is described in Section 4.2 Operational guidance for the integrator role.
Page 10
UM2852 Operational guidance for the integrator role RDP Level The TOE is certified in RDP level 2 with an OEM2 password. The OEM2 password gives the flexibility in a first step to perform RDP regression from level 2 to level 1, then to perform RDP regression from level 1 to level 0 (provoking a Flash memory mass erasure) in a second step.
Page 11
UM2852 Operational guidance for the integrator role Image upgrade strategy The TOE is certified in overwrite mode as an image upgrade strategy (Image upgrade strategy is applicable only in the case of primary and secondary slots mode). In this configuration, the new image in a secondary slot is copied into the primary slot by overwriting the previous image, during the firmware upgrade process.
Page 12
UM2852 Operational guidance for the integrator role Image encryption The TOE is certified with image encryption capability enabled and with the use of encrypted firmware images. In a configuration with image encrypted capability enabled, the firmware image can be provided either in clear format or in AES‑CTR‑128 encrypted format.
Page 13
UM2852 Operational guidance for the integrator role TOE specific information personalization The integrator has also the privilege and responsibility of configuring cryptographic keys used by the TOE to authenticate Secure Image and non-secure image and of configuring information (cryptographic keys and instance ID) used by the TOE to compute the token value for the platform attestation.
UM2852 Operational guidance for the integrator role External memories use The integrator can also choose to use external Flash or SRAM memories for its non-secure application. To use the certified configuration, it is not allowed to use external memories for non-secure applications. TOE functions changes Finally, the integrator can choose to modify functions implemented in software in the TOE (such as replacing some cryptographic functionality with a different implementation or such as removing some functions of the TOE...
Page 15
UM2852 Operational guidance for the integrator role Method of use: • Power-on the system as defined in RM0456. • Reset the STM32U585xx as defined in RM0456. • “Running” non‑secure application generates a reset (ArmV8 reset instruction or operation). Parameters: • Not applicable Actions: •...
Page 16
UM2852 Operational guidance for the integrator role Method of use: • The secure image secondary slot region is located at address FLASH_AREA_2_OFFSET (defined in TFM\ Linker\flash_layout.h file), as described in Figure 3. To use the secure image secondary slot, data must be written in the correct image format in the secure Image secondary slot area and the Magic 16 bytes must be written in the slot area end location as described in Figure...
Page 17
UM2852 Operational guidance for the integrator role Parameters: • The candidate image is written in the secure image secondary slot. Actions: • At each product reset TOE (TFM_SBSFU_Boot application) checks if a new image is pre-loaded by a non‑secure application or the standalone external loader application in the secure image secondary slot. The new secure image must be programmed at the beginning of the secure Image secondary slot and must comply with the image format (image header, image payload, and image TLV) as defined by the TF M_SBSFU_Boot application.
Page 18
UM2852 Operational guidance for the integrator role ‑ secure image primary slot in the case of the following errors: The candidate image is not installed in the non • Version dependency failure: The version of the non‑secure image is non‑consistent with the version of the secure image.
Page 19
UM2852 Operational guidance for the integrator role Actions: Errors: JTAG interface Standard JTAG with SWD interface allows debugging of the TOE and integrator application. It is used according IEE1149 and ADI5. When RDP is Level 2 and OEM2 password is provisioned, all debug features are disabled. JTAG/SWD remains enabled under reset only to inject OEM2 password to request RDP regression to level 1.
UM2852 Operational guidance for the integrator role Method of use: • Reset the STM32U585xx as defined in RM0456. • Set the GPIO port C pin 13 (Press the user button on the B-U585I-IOT02A development board) when the TFM_SBSFU_Boot application is starting to execute. Parameters: •...
UM2852 Operational guidance for the integrator role • STM32U585xx option bytes values violation: in case STM32U585xx option bytes values are not correctly configured to ensure the TOE security, the TOE secure boot procedure after reset detects the problem and blocks the TOE secure boot procedure execution: Reset is generated, except for the case of RDP option bytes value for which infinite loop is executed in the secure domain.
UM2852 Operational guidance for the integrator role • The integrator must protect the integrity of the immutable part of the TOE (TFM_SBSFU_Boot application) until it is programmed and well protected inside the TOE of each device. • The persons responsible for the application of the procedures described in Section 3 Preparative procedures, and the persons involved in the delivery and protection of the product must have the required skills and must be aware of the security issues.
UM2852 List of figures List of figures Figure 1. Flash memory layout for certified configuration ..........8 Figure 2.
Page 27
ST’s terms and conditions of sale in place at the time of order acknowledgement. Purchasers are solely responsible for the choice, selection, and use of ST products and ST assumes no liability for application assistance or the design of Purchasers’...
Need help?
Do you have a question about the STM32U585 Series and is the answer not in the manual?
Questions and answers